Please turn on your JavaScript for this page to function normally.
Tips for guarding against mobile malware threats

In order to guard against growing mobile malware threats, Juniper Networks offers the tips below. For consumers: Install an on-device anti-malware solution to protect against …

Phishing attacks rise year over year

Phishing attacks in Q1 2011 increased significantly compared to Q1 2010, according to IID. Criminals utilized phishing scams 12 percent more from January to March 2011 than …

HP Intelligent Management Center multiple vulnerabilities

Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …

Free credit and identity theft protection service

TrustedID launched IDSafe, a free consumer credit and identity theft protection service to provide core coverage at absolutely no cost. IDSafe provides consumers a free credit …

WatchGuard introduces next-generation firewall

WatchGuard unveiled its most powerful security appliance, the XTM 2050. This next-generation firewall (NGFW) providessecurity for large organizations and data centres that …

Explosive financial malware targets Windows

Trusteer identified Sunspot, a little known Windows malware platform that has been in circulation for some time, but was never previously recognized for its financial fraud …

Protect, share and sync data remotely

Trend Micro announced SafeSync for Business to help even the smallest companies securely save, manage and access their digital files from anywhere at any time, while …

Visa unveils new payments solutions

Visa today announced the next generation of payments solutions that include a secure cross-channel digital wallet and a range of customized mobile payments services. The …

BackTrack 5 released

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …

Exponent CMS multiple vulnerabilities

Multiple vulnerabilities have been discovered in Exponent CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks and disclose sensitive …

Majority not prepared for IPv6 transition

88% of business networks were not fully ready for a change to IPv6, with two thirds (66.1%) saying their networks are only 0-20% ready, despite the fact that the last blocks …

Run OS X, Windows and Linux side-by-side on a Mac mini

Parallels Server for Mac 4.0 Mac mini Edition lets businesses turn an Apple Mac mini server running Mac OS X Server into a multi-purpose platform capable of running Mac OS X, …

Don't miss

Cybersecurity news